[Next]
[Up]
[Previous]
[Contents]
Next:
5.1 General
Up:
CORBASEC Frequently Asked Questions
Previous:
4.4.9 [IMAGE ]What is
5
. CORBASEC implementations
5
.
1
General
5
.
1
.
1
[IMAGE ]Where can I find an implementation of Security Services ?
5
.
1
.
2
[IMAGE ]Where can I find exactly what product implements what Security level and options?
5
.
1
.
3
[IMAGE ]What ORBs claim to have ``security'' functionality?
5
.
1
.
4
Does anyone know of a product that is IIOP compliant and provides CORBA security service level 1?
5
.
1
.
5
[IMAGE ]Is there any free/trial/evaluation version of an ORB with Security Service for Java?
5
.
1
.
6
[IMAGE ]What would be the most suitable ORB product(s) when buliding a (very) small lab for evaluating, testing and implementing security functions in a CORBA system?
5
.
1
.
7
[IMAGE ]Are CORBAsec implementations from the US generally subjected to export control?
5
.
2
Particular Implementations
5
.
2
.
1
DAIS Security
5
.
2
.
1
.
1
What is DAIS Security?
5
.
2
.
1
.
2
What is the current version of DAIS Security
5
.
2
.
1
.
3
What is the current status of DAIS Security?
5
.
2
.
1
.
4
Does DAIS conform to CORBASEC specifications?
5
.
2
.
1
.
5
Why did ICL choose the CSI-ECMA security mechanism in its DAIS Security implementation?
5
.
2
.
1
.
6
What features does DAIS Security offer?
5
.
2
.
1
.
7
What is the advantage of using roles in DAIS Security?
5
.
2
.
1
.
8
What are the advantages (and disadvantages) of using public key technology in DAIS Security?
5
.
2
.
1
.
9
What are the advantages (and disadvantages) of using secret key technology (passwords) in DAIS Security?
5
.
2
.
1
.
10
Why have domains in DAIS Security?
5
.
2
.
1
.
11
Why policy domains?
5
.
2
.
1
.
12
Where can find more information on DAIS Security?
5
.
2
.
2
OrbixSecurity
5
.
2
.
2
.
1
[IMAGE ]What is the conformance level of OrbixSecurity?
5
.
2
.
2
.
2
[IMAGE ]Where do I start from in order to use OrbixSecurity?
5
.
2
.
2
.
3
What DCE components are required to use OrbixSecurity?
5
.
2
.
2
.
4
Can a user on a remote machine still run the server and call its methods if he or she changes their username on the remote machine deliberately to match the registered users list?
5
.
2
.
2
.
5
What authentication process is used in OrbixSecurity?
5
.
2
.
2
.
6
How does OrbixSecurity work and how and what component of DCE needs to be installed?
5
.
2
.
2
.
7
[IMAGE ]Can we use Orbix security to provide Access control at Object instance level?
5
.
2
.
2
.
8
Authentication Security Exception
5
.
3
VisiBroker
5
.
3
.
1
[IMAGE ]Does anyone has experience on implementing system access control and security service using VisiBroker for Java?
5
.
4
omniORB
44
5
.
4
.
1
[IMAGE ]If there is a security service supported by omniORB and if not are there any plans to create one?
5
.
5
Intraverse
5
.
5
.
1
[IMAGE ]Has anybody integrated DASCOM's Intraverse and Entrust (PKI), and Iona's OrbixWeb?